Cyber News - Page 96

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
Masuta botnet image

Mirai-Based Masuta IoT Botnet Spreads in a Worldwide Attack

Security analysts discovered a new dangerous botnet based on Mirai that is used in a worldwide attack campaign. It is called Masuta and it has already impacted a lot of devices, at the moment it is believed that an experienced…

CYBER NEWS

Cryptocurrency and the Fight Against the Net Neutrality Repeal

With the vote against net neutrality, cryptocurrencies have had to have a rethink what they can do to ensure their services will not be affected by the larger ISPs. It is the case that there could be a conflict of…

CYBER NEWS

Dark Caracal Spyware Operating at a Global Scale

A string of new spyware has been detected by security researchers. Dubbed Dark Caracal, the campaigns seem to be operating out of a government building in Lebanon. The campaigns have attacked thousands of victims in at least 21 countries. The…

CYBER NEWS

Satori.Coin.Robber Botnet May Be Stealing Your Ethereum

The infamous Satori botnet has once again been caught in the wild, this time targeting rigs mining for the Ethereum cryptocurrency. Researchers dubbed this latest iteration Satori.Coin.Robber. Satori is a botnet that exploits a flaw in Huawei and a bug…

CYBER NEWS

Skygofree Android Trojan – the Most Sophisticated Mobile Spyware Ever

Researchers recently came across a piece of Trojan that deserves lots of attention due to its highly sophisticated spying capabilities. The Trojan is named Skygofree, after one of the domains it used, and its target is Android. Skygofree was discovered…

CYBER NEWS

RubyMiner Malware – How to Detect and Remove It from Your Computer

This article has been created in order to explain what is the RubyMiner malware threat and how to remove it from your computer. New cryptocurrency miner, known as RubyMiner has been detected by malware researchers. The virus aims to mine…

CYBER NEWS

Data Security Tips and Pitfalls to Know About in 2018

In 2017 we saw international corporations, public figures, and individuals alike become the victims of major data security breaches. Most prominently, perhaps, was the leaking of nearly 150 million American’s social security numbers by Equifax. There were also major breaches…

CYBER NEWS

BlackWallet App Compromised, 400,000 USD In Lumens Stolen

The BlackWallet browser-based wallet application has been compromised and 400,000 USD in user funds (in the Stellar Lumen cryptocurrency) were stolen from it. It’s still unknown who is behind this attack. To perform the attacks, hackers hijacked the DNS servers…

CYBER NEWS

Malware Trends 2018: How Is the Threat Landscape Shaping?

2018 is already here, and it has started pretty strong for cybersecurity with the disclosure of the Meltdown and Spectre vulnerabilities. However, the question still remains – what will this year bring in terms of malware coding, attacks on enterprises…

CYBER NEWS
WhatsApp and Signal security image

WhatsApp and Signal Bugs Expose Encrypted Group Chats

A dangerous security bug has been identified in the popular WhatsApp and Signal messenger aps that allows hackers to covertly gain access to encrypted group chats. The experts that discovered the exploit reveals that the problem lies in the intermediate…

CYBER NEWS

Hackers Are Getting Smarter – But What Can You Do About It?

The image of a hacker as some manchild in his mom’s basement is a thing of the past. Today’s criminals are smarter, savvier, and more professional than ever. How can you defend against them? 73% of Americans have at some…

CYBER NEWS

RIG EK Currently Delivering Monero Miner to Unsuspecting Users

Until recently, exploit kits were mostly deployed to distribute ransomware. However, following the current trend in worldwide infections, cybercriminals have started using exploit kits for the distribution of cryptocurrency miners. Exploit Kits and Drive-By Downloads Actively Used in the Distribution…

CYBER NEWS
Turla hackers image

Turla Hackers Employ Mosquite Backdoor Against Diplomats

The Turla Hackers are a famous criminal collective that are widely known for executing complex attacks against large companies and government institutions. Security experts have detected that they are responsible for a large-scale ongoing hacking campaign against embassies and consulates…

CYBER NEWS
Monero CryptoCurrency Miner image

Monero Cryptocurrency Miner Generates Profit for North Korea

Security researchers discovered that a recently released Monero cryptocurrency miner sends out the generated income to the Kim Il Sung University in North Korea. An in-depth code analysis reveals that it can be updated to include additional components as well.…

CYBER NEWS

Windows Gets No Security Patches Unless AV Programs Set a Registry Key

Microsoft just made an important announcement on their support page regarding incompatibilities between antivirus programs and the Windows patches for Meltdown and Spectre. Microsoft identifies compatibility issue in how some AV programs handle the Meltdown and Spectre updates for Windows…

CYBER NEWS
WaterMiner Monero Miner

PyCryptoMiner Targets Linux Machines to Mine for Monero

A Linux-based Monero miner botnet, which has been dubbed PyCryptoMiner has been discovered by security researchers. The botnet which is based on a cryptocurrency miner has earned cybercriminals at least 158 Monero which amounts to $63,000. PyCryptoMiner has been written…

CYBER NEWS

KB4056892 – Emergency Windows 10 Update to Address Processor Flaws

The 2018 year started with some pretty major exploit discoveries. Named Meltdown and Spectre, these exploits are perhaps the most dangerous processor flaws that affect almost all modern processors. The security vulnerabilities affect whole generations of computers and devices of…

CYBER NEWS
Meltdown and Spectre Exploits image

Meltdown and Spectre Exploits Endanger Generations of Computers

Security researchers discovered one of the most dangerous processor flaws called Meltdown and Spectre that affect almost all modern processors. The security vulnerabilities affect whole generations of computers and devices of all types that use the quoted chips. As a…

CYBER NEWS

Trackmageddon: GPS Location Tracking Service Making You Hackable

There is hardly a day without any privacy-related incident, data breach or vulnerability disclosure. It turns out that even many of the GPS services we use on a daily basis are full of multiple vulnerabilities. These vulnerabilities, dubbed Trackmageddon could…

CYBER NEWS

Why Cybercriminals Are Ditching Bitcoin for Altcoins

There is Bitcoin, and then there are the altcoins, the alternative cryptocurrencies created after the success of Bitcoin. According to many experts in the cybersecurity field, Bitcoin may no longer be the most preferable cryptocurrency used by cybercriminals in their…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree